Cybersecurity
Cybersecurity is critical to governme🍒nts, businesses,🔥 organizations, and individuals. Browse Investopedia’s expert-written library to learn more.
Guide to Cybersecurity
:max_bytes(150000):strip_icc()/GettyImages-1490104284-f78364bc18ca47adbbe769e9d85365cf.jpg)
:max_bytes(150000):strip_icc()/shutterstock_253136563-5bfc2b70c9e77c00517fcd96.jpg)
:max_bytes(150000):strip_icc()/womanatcomputer-ceee239ff2c44dc08438f6818db9d118.jpg)
:max_bytes(150000):strip_icc()/HowtoAvoidDebitCardFraud-870d0b4d6c7a48d19d8da8443920216f.jpg)
:max_bytes(150000):strip_icc()/Investopedia_Cloudsecurity_colorv1-cc5b9df052584dac92be9302ee70df44.png)
Frequently Asked Questions
-
Two-factor authentication (2FA) is a security measure that requires two separate forms of identification in order to access something. The first factor is typically a password while the second can be a code s🤡ent to the user’s phone or tablet or biometrics using their fingerprint, face, or retina 2FA combines twoꦯ of the following: something you know (password), something you are (your fingerprint, face, or retina), and something you have (a phone or tablet).
Learn More: What Is Two-Factor Authentication (2FA)? -
Cybersecurity describes the collective measures to protect internet-connected devices, networks, and data, from unauthori꧅zed access and criminal use. Cybersecurity seeks to ensure the confidentiality, integrity, and availability of data over its entire life cycle. Cybersecurity protects both software and hardware. It can be used to protect everything from personal inform⛄ation to complex government systems.
Learn More: Cybersecurity -
According to the 2022 Global Cyber Threat Report by SonicWall, a cybersecurity company, governments around the world saw a 1,885% increase in cyber attacks in 2021. The Chair of the Federal Reserve Jerome Powell in the U.S. also expressed concern over the state of cybersecurity. In February 2020, Powell stated that cybersecurity is the greatest risk facing the financial system.
Learn More: Cyberattacks and the Risk of Bank Failures -
Aaron’s Law is a bill introduced to the U.S. Congress in 2014 Representative Zoe Lofgren of California. The bill was named after Aaron Swartz, an early internet innovator and activist who committedꦚ suicide while facing a potential 35-year prison sentence for illegally downloading millions of academic articles that were only available via a subscription service. The bill did not pass, but is still used in legal discussions about internet privacy.
Learn More: Aaron’s Law
Key Terms
- General Data Protection Regulation (GDPR)
The General Data Protection Regulation (GDPR) is a piece of legislation passed in April 2016 that requires websites to disclose to its visitors living in the European Union how it collects and uses visitors’ personal data. The GDPR must be heeded by all sites that attract European visitors, even if they don't specifically market goods or services to EU residents. The GDPR requires websites to ask its visitors to “accept cookies”, i.e. allow their personal information to be collected and used by the site’s owner.
- Encryption
Encrﷺyption is the process of translating data using an algorithm that makes the original information unreadable to unauthorizℱed users. Encrypted data can only be accessed, or decrypted, by those with the correct key or cipher. Decryption helps keep private information, personal messages, and financial information secure.
- Dark Web
The Dar🗹k Web refers to online content that isn’t indexed by traditional search engines. These websites aren’t accessible to the general public and instead can only be accessed using specific web browsers such 💖as the Tor browser.
- Ransomware
Ranಞsomware is a tactic used by hackers to hijack a user’s computer system. In a ransomware attack, a user’s computer system is held hostage until they pay the hacker a ransom to unlock their computer and return their data to them. The hacker often demands payment in cryptocurrency to protect their anonymity.
- Cloud Computing
Cloud computing delivers and stores different types of information on the internet rather than keeping files on a proprietary hard drive or local storage device. There are three main types of cloud computing, including: 澳洲幸运5官方开奖结果体彩网:software-as-a-service (SaaS), infrastructure-as-a-service (IaaS), and 🥂platform-as-a-service (PaaS).
:max_bytes(150000):strip_icc()/pig-butchering-scams-8605501-final-58d7cd2fdfff491ab365912a66646871.png)
:max_bytes(150000):strip_icc()/hacker-58bac68e5f9b58af5cb50fe7.jpg)
:max_bytes(150000):strip_icc()/cloud-computing-4199287-f346729f8f574000a3058b9ad69e9a41.png)
:max_bytes(150000):strip_icc()/dark-web-4198212-bdd6dd31665e440789a47bd7f2b14460.jpg)
:max_bytes(150000):strip_icc()/general-data-protection-regulation-gdpr.asp-final-1b12e02aa4d149b9af4fcd8aec409a89.png)
:max_bytes(150000):strip_icc()/shutterstock_1096058765-5bfc308b46e0fb00265cd857.jpg)
:max_bytes(150000):strip_icc()/a27-5bfc3ce4c9e77c00518425a0.jpg)
:max_bytes(150000):strip_icc()/smiling-customer-service-representative-using-computer-at-desk-867405374-4b2bc399315c45e9835ca1d5c6072d66.jpg)
:max_bytes(150000):strip_icc()/network-communications-896183140-763ecfa74c47472fb6faacbd7934df76.jpg)
:max_bytes(150000):strip_icc()/shutterstock465027146security-5bfc2b2fc9e77c005143e126.jpg)
:max_bytes(150000):strip_icc()/investing13-5bfc2b8f46e0fb0026016f4d.jpg)
:max_bytes(150000):strip_icc()/data-security-concept--login-and-password-876819100-0a2f68e3152e4197ac5fcb1737b5932b.jpg)
:max_bytes(150000):strip_icc()/GrayBox_v1-babc3a8cee004a3b8028228e6b6a9d55.jpg)
:max_bytes(150000):strip_icc()/business_building_153697270-5bfc2b9846e0fb0083c07d69.jpg)
:max_bytes(150000):strip_icc()/SupplyChainAttackGettyImages-1319794657-6f8a25f27f1f46d9854e28e34a901544.jpg)
:max_bytes(150000):strip_icc()/GettyImages-1036166450-c77be805b3c3497ead255c2da54bda19.jpg)
:max_bytes(150000):strip_icc()/business_building_153697270-5bfc2b9846e0fb0083c07d69.jpg)
:max_bytes(150000):strip_icc()/shutterstock_152862707-5bfc2b7046e0fb0083c07771.jpg)
:max_bytes(150000):strip_icc()/who-knows-what-a-hacker-can-do-with-your-information-691171106-54dc1bfe4aca4cdf83d7532e59e9a1f2.jpg)
:max_bytes(150000):strip_icc()/shutterstock_152862707-5bfc2b7046e0fb0083c07771.jpg)
:max_bytes(150000):strip_icc()/shutterstock_112522391-5bfc2b9846e0fb0051bde2d3.jpg)
:max_bytes(150000):strip_icc()/GettyImages-1331943958-a4f8518042e14de98b01bb20ea574380.jpg)
:max_bytes(150000):strip_icc()/vpn-D3Damon-5782a3675f9b5831b5cdd2c3.jpg)
:max_bytes(150000):strip_icc()/twofactor-authentication-2fa.asp-final-5dc205d2a08b447abfb2e15eb131e28e.png)
:max_bytes(150000):strip_icc()/Term-b-biometrics_Final-35bc8a0cc5bb44bba73f8cfff21b4996.png)
:max_bytes(150000):strip_icc()/final_macrovirus_definition_0109-fd4ab3ebfe51452bb561f17b691f2f4e.png)
:max_bytes(150000):strip_icc()/Data-Migration-Final-00e5e9620cb14db384a06bf94d05d392.jpg)